Patents by Inventor Kshitij Arun Doshi

Kshitij Arun Doshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220377141
    Abstract: A system and method for managing sensors including determining health operation states of the sensors correlative with sensor accuracy, classifying the sensors by their respective health operation state, and teaming two sensors each having a health operation state that is intermediate to give a team having a health operation state that is healthy. The sampling frequency of the sensors to determine sensor accuracy may be dynamic.
    Type: Application
    Filed: May 10, 2022
    Publication date: November 24, 2022
    Inventors: Kshitij Arun Doshi, Tao Zhong, Gang Yi Deng, Zhongyan Lu
  • Publication number: 20220337481
    Abstract: Various approaches for deployment and use of configurable edge computing platforms are described. In an edge computing system, an edge computing device includes hardware resources that can be composed from a configuration of chiplets, as the chiplets are disaggregated for selective use and deployment (for compute, acceleration, memory, storage, or other resources). In an example, configuration operations are performed to: identify a condition for use of the hardware resource, based on an edge computing workload received at the edge computing device; obtain, determine, or identify properties of a configuration for the hardware resource that are available to be implemented with the chiplets, with the configuration enabling the hardware resource to satisfy the condition for use of the hardware resource; and compose the chiplets into the configuration, according to the properties of the configuration, to enable the use of the hardware resource for the edge computing workload.
    Type: Application
    Filed: May 5, 2022
    Publication date: October 20, 2022
    Inventors: Francesc Guim Bernat, Kshitij Arun Doshi, Ned M. Smith, Timothy Verrall, Uzair Qureshi
  • Publication number: 20220334823
    Abstract: Various systems and methods for enabling derivation and distribution of an attestation manifest for a software update image are described. In an example, these systems and methods include orchestration functions and communications, providing functionality and components for a software update process which also provides verification and attestation among multiple devices and operators.
    Type: Application
    Filed: May 2, 2022
    Publication date: October 20, 2022
    Inventors: Ned M. Smith, Kshitij Arun Doshi, John J. Browne, Vincent J. Zimmer, Francesc Guim Bernat, Kapil Sood
  • Publication number: 20220329433
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to protect distributed data. An example apparatus includes at least one memory, machine readable instructions, and processor circuitry to at least one of instantiate or execute the machine readable instructions to detect a key identifier combination from a distributed key, identify a match between the key identifier combination and a platform identifier combination, extract a second key from the distributed key, the second key associated with the object, and decrypt the object via the extracted second key.
    Type: Application
    Filed: June 17, 2022
    Publication date: October 13, 2022
    Inventors: Kshitij Arun Doshi, Christian Maciocco, Ned M. Smith, Francesc Guim Bernat, Satish Jha, Vesh Raj Sharma Banjade, Arvind Merwaday, S M Iftekharul Alam, Kuilin Clark Chen
  • Publication number: 20220329522
    Abstract: Disclosed are systems and methods for adaptive resilient network communication. A system may monitor network traffic on multiple pathways between user equipment and an application or a service at a network destination, gather network telemetry data from the monitored network traffic, input the network telemetry data into a trained artificial intelligence model, and classify the network telemetry data using the model. The system may further determine, using the model, an anomaly condition in at least a portion of the multiple pathways, and in response to the determination of an anomaly, select a mitigation technique for the at least a portion of the multiple pathways.
    Type: Application
    Filed: June 29, 2022
    Publication date: October 13, 2022
    Inventors: Christian Maciocco, Ren Wang, Kshitij Arun Doshi, Francesc Guim Bernat, Ned M. Smith, Satish Chandra Jha, Vesh Raj Sharma Banjade, S M Iftekharul Alam, Shu-ping Yeh
  • Publication number: 20220329499
    Abstract: Various systems and methods for providing opportunistic placement of compute in an edge network are described herein. A node in an edge network may be configured to access a service level agreement related to a workload, the workload to be orchestrated for a user equipment by the node; modify a machine learning model based on the service level agreement; implement the machine learning model to identify resource requirements to execute the workload in a manner to satisfy the service level agreement; initiate resource assignments from a resource provider, the resource assignments to satisfy the resource requirements; construct a resource hierarchy from the resource assignments; initiate execution of the workload using resources from the resource hierarchy; and monitor and adapt execution of the workload based on the resource hierarchy in response to the execution of the workload.
    Type: Application
    Filed: June 28, 2022
    Publication date: October 13, 2022
    Inventors: Ned M. Smith, S M Iftekharul Alam, Satish Chandra Jha, Vesh Raj Sharma Banjade, Christian Maciocco, Kshitij Arun Doshi, Francesc Guim Bernat, Nageen Himayat
  • Publication number: 20220269960
    Abstract: Various systems and methods of initiating and performing contextualized AI inferencing, are described herein. In an example, operations performed with a gateway computing device to invoke an inferencing model include receiving and processing a request for an inferencing operation, selecting an implementation of the inferencing model on a remote service based on a model specification and contextual data from the edge device, and executing the selected implementation of the inferencing model, such that results from the inferencing model are provided back to the edge device. Also in an example, operations performed with an edge computing device to request an inferencing model include collecting contextual data, generating an inferencing request, transmitting the inference request to a gateway device, and receiving and processing the results of execution. Further techniques for implementing a registration of the inference model, and invoking particular variants of an inference model, are also described.
    Type: Application
    Filed: February 10, 2022
    Publication date: August 25, 2022
    Inventors: Francesc Guim Bernat, Suraj Prabhakaran, Kshitij Arun Doshi, Da-Ming Chiang, Joe Cahill
  • Patent number: 11425111
    Abstract: Various approaches for implementing attestation using an attestation token are described. In an edge computing system deployment, an edge computing device includes an attestable feature (e.g., resource, service, entity, property, etc.) which is accessible from use of an attestation token, by the operations of: obtaining a first instance of a token that provides proof of attestation for an accessible feature of the edge computing device, with the token including data to indicate trust level designations for the feature as attested by an attestation provider; receiving, from a prospective user of the feature, a request to use the feature and a second instance of the token, with the second instance of the token originating from the attestation provider; and providing access to the feature based on a verification of the instances of the token, by using the verification to confirm attestation of the trust level designations for the feature.
    Type: Grant
    Filed: November 14, 2019
    Date of Patent: August 23, 2022
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, John J. Browne, Kapil Sood, Francesc Guim Bernat, Kshitij Arun Doshi, Rajesh Poornachandran, Tarun Viswanathan, Manish Dave
  • Publication number: 20220255916
    Abstract: Methods and apparatus to attest objects in edge computing environments are disclosed. An example apparatus generate an attestation information object in an edge computing environment includes an evidence collector to collect evidence for an attestation information object to attest the authenticity of a first object, a temporal data generator to generate temporal information associated with data associated with the object, the evidence collector to associate the evidence and the temporal information with the first object, and an interface generator to generate an interface for the attestation information object.
    Type: Application
    Filed: September 30, 2020
    Publication date: August 11, 2022
    Inventors: Ned M. Smith, Dario Sabella, Kshitij Arun Doshi, Francesc Guim Bernat, Rajesh Gadiyar
  • Patent number: 11412052
    Abstract: An architecture to perform resource management among multiple network nodes and associated resources is disclosed. Example resource management techniques include those relating to: proactive reservation of edge computing resources; deadline-driven resource allocation; speculative edge QoS pre-allocation; and automatic QoS migration across edge computing nodes.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: August 9, 2022
    Assignee: Intel Corporation
    Inventors: Francesc Guim Bernat, Patrick Bohan, Kshitij Arun Doshi, Brinda Ganesh, Andrew J. Herdrich, Monica Kenguva, Karthik Kumar, Patrick G Kutch, Felipe Pastor Beneyto, Rashmin Patel, Suraj Prabhakaran, Ned M. Smith, Petar Torre, Alexander Vul
  • Publication number: 20220239507
    Abstract: Various approaches for memory encryption management within an edge computing system are described. In an edge computing system deployment, a computing device includes capabilities to store and manage encrypted data in memory, through processing circuitry configured to: allocate memory encryption keys according to a data isolation policy for a microservice domain, with respective keys used for encryption of respective sets of data within the memory (e.g., among different tenants or tenant groups); and, share data associated with a first microservice to a second microservice of the domain. Such sharing may be based on the communication of an encryption key, used to encrypt the data in memory, from a proxy (such as a sidecar) associated with the first microservice to a proxy associated with the second microservice; and maintaining the encrypted data within the memory, for use with the second microservice, as accessible with the communicated encryption key.
    Type: Application
    Filed: February 10, 2022
    Publication date: July 28, 2022
    Inventors: Ned M. Smith, Kshitij Arun Doshi, Francesc Guim Bernat, Mona Vij
  • Publication number: 20220231964
    Abstract: A resource management framework may be used to improve performance of dominant and non-dominant resources for edge multi-tenant applications. The resource management framework may include an admission control mechanism, which may be used to balance disproportionate resource allocations by controlling allocation of unconstrained resources proportional to the requested dominant resources based on resource availability. The admission control mechanism may provide ongoing monitoring of dominant and non-dominant resource utilization, such as using a hybrid centralized-distributed telemetry collection approach. The resource management framework may also include a lightweight resource monitoring and policy enforcement mechanism on distributed networking elements to reduce or eliminate the exploitations of non-dominant resources.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 21, 2022
    Inventors: S M Iftekharul Alam, Satish Chandra Jha, Ned M. Smith, Vesh Raj Sharma Banjade, Kshitij Arun Doshi, Francesc Guim Bernat, Arvind Merwaday, Kuilin Clark Chen, Christian Maciocco
  • Publication number: 20220222337
    Abstract: The present disclosure describes a micro-enclave (?enclave) framework including ?enclave operations, which are library functions that split off from normal code execution. The ?enclaves contain a mix of stateful and stateless operations, including such steps as reading or writing various hardware registers or resource counters in operating system, timer setup, deferring preemption events by a small value within a threshold set by the operating system, and the like. The operations in a ?enclave, even though performed at a user level privilege, are compiled by a separate compilation sequence and installed unforgeably as static and unforgeable procedure collections that do not yield control to an operating system scheduler.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Kshitij Arun Doshi, Francesc Guim Bernat
  • Publication number: 20220222077
    Abstract: System and techniques for tag checking procedure calls include specifying a value for a color in a program-counter relative (PC-relative) call instruction from a call site to a call target. A pointer is provided to steer the PC-relative call instruction to the call target based on the color. A function call is generated to the call target based on the pointer. Other systems, methods and apparatuses are also described.
    Type: Application
    Filed: March 31, 2022
    Publication date: July 14, 2022
    Inventors: Kshitij Arun Doshi, Francesc Guim Bernat
  • Publication number: 20220222105
    Abstract: System and techniques for container provisioning are described herein. A request to instantiate a container image may be made. This request specifies a name for the container image where the name is created through a first defined generation process applied to contents of the container image. A container manifest may be received from a local copy of a distributed container directory. The container manifest includes a set of entries for container layer images of the container image. Here, the set of entries are named by a second defined generation process applied to respective container layer images. Then, container layer images may be retrieved using names from the set of entries and the container image instantiated using the retrieved container layer images.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Jeffrey Christopher Sedayao, Juan Pablo Munzo, Vinoth kumar Chandra Mohan, Promila Agarwal, Dean Chu, Eve M. Schooler, Kshitij Arun Doshi
  • Publication number: 20220225227
    Abstract: System and techniques for network slice resiliency are described herein. An indication of a fault-attack-failure-outage (FAFO) event for a network slice may be received. Here, the network slice is one of multiple network slices. A capacity in a slice segment may be estimated to determine whether there is enough capacity to meet a service level agreement (SLA) of the multiple network slices based on the FAFO event. In this case, the slice segment is a set of physical resources shared by the multiple network slices. Operation of the slice segment may then be modified based on results from estimating the capacity in the slice segment to address impacts from the FAFO event.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Satish Chandra Jha, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Ned M. Smith, Arvind Merwaday, Kshitij Arun Doshi, Francesc Guim Bernat, Liuyang Lily Yang, Kuilin Clark Chen, Christian Maciocco, Marcio Rogerio Juliato, Maruti Gupta Hyde, Manoj R. Sastry
  • Publication number: 20220222359
    Abstract: System and techniques for fault tolerant telemetry of distributed devices are described herein. A node includes a hardware component that receives telemetry from an entity resident on the node. The hardware component signs the telemetry with a cryptographic key to create signed telemetry and stores the signed telemetry in memory of the hardware component. Then, upon request from a remote entity, the hardware component provides the signed telemetry.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Kshitij Arun Doshi, Francesc Guim Bernart, Ned M. Smith
  • Publication number: 20220224442
    Abstract: System and techniques for semantic network data correction are described herein. Semantic data corresponding to a data stream may be received. Here, the semantic data is based on the data stream. The data stream, including packets, is received. At least one packet has an error due to transmission via a network link. This error introduces an ambiguity for content of the packet. The error is corrected using the semantic data. The semantic data providing a constraint on the ambiguity to eliminate possible corrections for the error.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Amar Srivastava, Kshitij Arun Doshi, Christian Maciocco
  • Publication number: 20220224776
    Abstract: The present disclosure is related to managing a caching system based on object fetch costs, where the fetch cost are based on the access latency, cache misses, and time to reuse of individual objects. The caching system may be a multi-tiered caching system that includes multiple storage tiers, where an object management system determines whether to retain or evict an object from a cache of a particular storage tier based on the object's fetch cost. Additionally, eviction can include moving objects from a current storage tier to another storage tier based on the current storage tier and fetch costs.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Kshitij Arun Doshi, Francesc Guim Bernat, Ned M. Smith
  • Patent number: 11388054
    Abstract: Various approaches for deployment and use of configurable edge computing platforms are described. In an edge computing system, an edge computing device includes hardware resources that can be composed from a configuration of chiplets, as the chiplets are disaggregated for selective use and deployment (for compute, acceleration, memory, storage, or other resources). In an example, configuration operations are performed to: identify a condition for use of the hardware resource, based on an edge computing workload received at the edge computing device; obtain, determine, or identify properties of a configuration for the hardware resource that are available to be implemented with the chiplets, with the configuration enabling the hardware resource to satisfy the condition for use of the hardware resource; and compose the chiplets into the configuration, according to the properties of the configuration, to enable the use of the hardware resource for the edge computing workload.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: July 12, 2022
    Assignee: Intel Corporation
    Inventors: Francesc Guim Bernat, Kshitij Arun Doshi, Ned M. Smith, Timothy Verrall, Uzair Qureshi